CVE-2026-43992: JunoClaw AI Exposes BIP-39 Seeds in Tool Calls
The National Vulnerability Database has disclosed CVE-2026-43992, a critical vulnerability in JunoClaw, an agentic AI platform built on Juno Network. Prior to version 0.x.y-security-1, JunoClaw’s Master Control Program (MCP) write tools — including send_tokens, execute_contract, and ibc_transfer — explicitly accepted mnemonic: string as a parameter. This design flaw meant that BIP-39 seeds were directly embedded within LLM tool-call JSON.
This exposure allows the BIP-39 seed to be transmitted across any transport layer, logged, or captured via telemetry services between the LLM provider and the MCP process. Such an uncontrolled disclosure of cryptographic seeds represents a catastrophic security failure, granting potential attackers complete control over associated assets. The National Vulnerability Database assigns this a CVSS score of 9.8 (CRITICAL), highlighting the severe implications for confidentiality, integrity, and availability.
The vulnerability has been addressed in JunoClaw version 0.x.y-security-1. Organizations leveraging JunoClaw must prioritize immediate patching. The broad attack surface — encompassing transport, logging, and telemetry — means that merely monitoring for exploitation might be insufficient; proactive remediation is the only viable path to mitigate this risk.
What This Means For You
- If your organization uses JunoClaw, you must immediately verify your version and patch to 0.x.y-security-1 or later. This isn't theoretical; a BIP-39 seed compromise means total loss of control over associated wallets and contracts. Audit all logs and telemetry for any mnemonic string exposure, especially for tools like `send_tokens` or `execute_contract`.
Related ATT&CK Techniques
🛡️ Detection Rules
3 rules · 6 SIEM formats3 detection rules auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free — export to any SIEM format via the Intel Bot.
CVE-2026-43992: JunoClaw AI Exposed BIP-39 Seed in Tool Call
title: CVE-2026-43992: JunoClaw AI Exposed BIP-39 Seed in Tool Call
id: scw-2026-05-12-ai-1
status: experimental
level: critical
description: |
Detects the presence of the 'mnemonic: string' parameter within command lines, which is indicative of JunoClaw AI versions prior to 0.x.y-security-1 exposing BIP-39 seeds in tool calls. This is a critical vulnerability as it directly exposes sensitive private key material.
author: SCW Feed Engine (AI-generated)
date: 2026-05-12
references:
- https://shimiscyberworld.com/posts/nvd-CVE-2026-43992/
tags:
- attack.defense_evasion
- attack.t1537
logsource:
category: process_creation
detection:
selection:
CommandLine|contains:
- 'mnemonic: string'
condition: selection
falsepositives:
- Legitimate administrative activity
Source: Shimi's Cyber World · License & reuse
Indicators of Compromise
| ID | Type | Indicator |
|---|---|---|
| CVE-2026-43992 | Information Disclosure | JunoClaw agentic AI platform prior to version 0.x.y-security-1 |
| CVE-2026-43992 | Information Disclosure | MCP write tools (send_tokens, execute_contract, instantiate_contract, upload_wasm, ibc_transfer) in JunoClaw |
| CVE-2026-43992 | Information Disclosure | Exposure of BIP-39 seed via 'mnemonic: string' parameter in LLM tool-call JSON |
Source & Attribution
| Source Platform | NVD |
| Channel | National Vulnerability Database |
| Published | May 12, 2026 at 20:16 UTC |
This content was AI-rewritten and enriched by Shimi's Cyber World based on the original source. All intellectual property rights remain with the original author.
Believe this infringes your rights? Submit a takedown request.